Conspiracy Theory Unofficial Narrative Fake Manufactured Terrorism The story of the London Bombings 7 July 2005 7/7 Jean Charles de Menezes Ian Blair Tony Blair

Spread the love

I’m not sure about this and I’d like some feedback.

THIS ARTICLE IS TO BE REPEATEDLY UPDATED AND AMENDED. While I have a lot, I don’t have the whole story so I would appreciate help with the uncertain parts. Thanks.

[23/11/13 One of the problems I encounter is that people helping don’t realise what I’ve already got. For example, I got the ’empty’ lead years ago when I was ignoring it as it was repeatedly raised.]

It’s a good day (to start).

Context, Terrorism, 2005 election, Inquiries Act, Bristol Indymedia, G8 & Privy Council ruling, Dust explosions, London Bombings, Cobra meeting for G8 not 7/7, Jerusalem Post articles, Ian Blair, murder of Jean Charles de Menezes

START:

Terrorism is a godsend for governments. It provides a wonderful excuse for dodgy newly-developed airplanes falling out of the sky when their doors open at 30 thousand feet and it provides a wonderful excuse for dust explosions on the London Underground. It provides a ready excuse for shitty old Jeeps with documented faults crashing off motorways and bursting into flames. It provides for massive made for television sacrificial rituals to start already planned wars.

7/1/14 The magick is working, I’m making fine progress – it’s almost as if it was hidden in plain sight all along. It was.

Just a tiny piece today. On 7/7/2005 – the day of explosions on the London underground and the strange bombing of a double-decker bus an hour later – the boss of the Metropolitan police Ian Blair said “The most important message though however is just that it, while it is a confused situation it must be a confused situation in multiple sites like this, a co-ordinated effort is slowly bringing order out of the chaos.”

There are two issues about this statement. Firstly try finding it using a search engine. It’s almost as if I made it up. I didn’t of course but the web has been scrubbed. That takes the sort of power that only governments have.

Secondly, what is meant by the phrase ‘order out of (the) chaos’ which is explained very well here

The need to deter democracy by alienating public opinion from public policy, is one that has been long understood. Back in 1921, the highly influential political columnist and media analyst Walter Lippmann, wrote the book “Public Opinion”,where he discussed the need for the “manufacture of consent”; given the inherent pitfalls and barriers to an accurate and effective public opinion (democracy, essentially), it is necessary that this opinion is crafted by a higher sphere of influence. This was understood very well by Edward Bernays, who was the founder of Public Relations (he indeed coined the term), and the formulator of not just corporate, but also political PR. He sketches out his views on this in his 1928 work, “Propaganda where he states that “The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society”, suggesting like Lippmann, that democracy is a “chaos” that needs regulation from above. This “above” is a small section of elites: “We are governed, our minds are molded, our tastes formed, our ideas suggested, largely by men we have never heard of.” These are the people who will ensure that the masses are sedated, and free to run their daily lives, without participating in the broader picture of public policy, given the dangers that this would pose to the influence of said elites, and thus the smooth functioning of society. To paraphrase Bernays, a leader must serve by leading, not lead by serving.   Read more: http://u2r2h.blogspot.co.uk/2007/08/911-and-propaganda-model.html#ixzz2pkrbXafu

As explained in the quoted section above, bringing order out of chaos can be understood to be ‘manufacturing of consent’,  “the conscious and intelligent manipulation of the organized habits and opinions of the masses …”

Well-educated people – better educated than myself – politicians and the like, people who … for whatever reason … have come to realise the meaning of the term would, er … recognise the term and know what it means. That there was a manipulation of events to manufacture consent going on.

8/1/14 Just for fun since we shouldn’t take ourselves too seriously, … he know’s I’m right. I’ve seen the light, it’s been revealed to Me, etc.

Enjoy

 

Continue ReadingConspiracy Theory Unofficial Narrative Fake Manufactured Terrorism The story of the London Bombings 7 July 2005 7/7 Jean Charles de Menezes Ian Blair Tony Blair

An original geeky post for a change (because as well as a political activist I’m also a geek)

Spread the love

OpenBSD is widely regarded as the most secure operating system. Today is the release date of the latest release OpenBSD 5.4. You’ll need to give it a few hours because it’s not yet 1/11 in Canada.

OpenBSD is secure because it is continually security audited. It is absolutely ideal for firewall/routers because of it’s advanced pf packet filter. It’s best suited for servers but also performs well on desktops and multimedia machines.

Other geeky things I’ve been doing lately

Learning C programming properly. C is all about pointers and indirection. It seems to be taught totally the wrong way. Pointers are key and all else follows …

I recapped a motherboard. You don’t need a new machine nowadays and I was pleased to revive a machine for a friend’s parents. It’s good to save a computer from the skip. I solder badly because I don’t do it often enough but I obviously solder well enough.

I replaced a Sempron LE-1150 with a really fast Athlon X2. Now it rocks.

[Cartoon of CMS learning curve implying that Drupal is very difficult to learn11/11/13  I’ve been trying to learn Drupal 7. Drupal is a Content Managment System (CMS) which also claims to be a CMS framework. A CMS is used to build websites and Drupal is used to build many of the most complex and advanced websites. As the diagram shows, Drupal is difficult to grok. My experience is that it’s counterintuitive and opposed to many of the principles of programming e.g. the use of global variables. But then it’s not programming of course – it’s an application for developing websites.

I did try Joomla and WordPress but it looks like Drupal is what I need to build the websites I want. I think it may be that you just have to learn the Drupal way. Just lately I’ve been doing some maintenance to this blog and realised that WordPress produces an awful lot of dead links which are no good to anyone. I’m thinking of converting this blog to Drupal soon and get some practice in.

There’s some weirdness about this post – not allowing me to edit it as I normally would. I’ve had to use a different browser because it simply appeared totally blank in the browser I normally use but yet it appears published fine. Weird.]

[9/12/13 I’ve been repairing analogue radios just recently. It’s surprising what some contact cleaner, compressed air and a vacuum cleaner can achieve. I still need to repair my favourite radio which was second-hand and well used when I got it about 1999. It will need some soldering but some radios are special.]

Some geeky tips

Use strong passwords. I particularly like long passwords because I know about brute-forcing.

Backup.

Get a real operating system. Linux livecds can help.

[More geeky tips. This could go on and on.

Firewall. Firewall on all interfaces especially on laptops and mobile devices. Lock it down.

Wireless should be considered insecure.

[6/11/13 The Guardian has published a Guide to Tor. The latest Tor browser bundle should be used and care should be taken. People have been caught-out accessing web-based email by not appreciating how it works. It should not be used for anything that divulges personal info and there’s not really much point in watching Youtube through Tor. If you’re in a repressive country it’s worth using. Basically, it hides what you’re looking at. [edit: It’s likely to get past broad political internet censorship. ]

If you have geek competence and spare resources please consider running a Tor relay as I do. There are certain dangers involved in running an exit node (relay) which do not apply to intermediate nodes.]

 

[4/11 What was I not thinking about? Mobile phones are designed to be mobile bugs.

… and here are the regulations from the ILETS / ENFOPOL affair of the 90s. These regulations are demands made by law enforcement authorities of the capabilities needed to infiltrate communications. Essentially, these law enforcement demands are design requirements for communication systems. You will notice that these requirements date from the mid 1990s. It’s probably safe to assume that they have been implemented by now. [Later edit: These regulations were intended particularly at mobile devices: phones at that time e.g. the reference to location. These regulations are bound to have been updated in the same culture of secrecy for technological developments since.]

COUNCIL RESOLUTION of 17 January 1995 on the lawful interception of telecommunications
(96/C 329/01)
Official Journal C 329 , 04/11/1996 p. 0001 – 0006

Annex: Requirements

This section presents the Requirements of law enforcement agencies relating to the lawful interception of telecommunications. These requirements are subject to national law and should be interpreted in accordance with applicable national policies. Terms are defined in the attached glossary.

1.Law enforcement agencies require access to the entire telecommunications transmitted, or caused to be transmitted, to and from the number or other identifier of the target service used by the interception subject. Law enforcement agencies also require access to the call-associated data that are generated to process the call.

1.1.Law enforcement agencies require access to all interception subjects operating temporarily or permanently within a telecommunications system.

1.2.Law enforcement agencies require access in cases where the interception subject may be using features to divert calls to other telecommunications services or terminal equipment, including calls that traverse more than one network or are processed by more than one network operator/service provider before completing.

1.3.Law enforcement agencies require that the telecommunications to and from a target service be provided to the exclusion of any telecommunications that do not fall within the scope of the interception authorization.

1.4.Law enforcement agencies require access to call associated data such as:

1.4.1.signalling of access ready status;

1.4.2.called party number for outgoing connections even if there is no successful connection established;

1.4.3.calling party number for incoming connections even if there is no successful connection established;

1.4.4.all signals emitted by the target, including post-connection dialled signals emitted to activate features such as conference calling and call transfer;

1.4.5.beginning, end and duration of the connection;

1.4.6.actual destination and intermediate directory numbers if call has been diverted.

1.5.Law enforcement agencies require information on the most accurate geographical location known to the network for mobile subscribers.

1.6.Law enforcement agencies require data on the specific services used by the interception subject and the technical parameters for those types of communication.

2.Law enforcement agencies require a real-time, fulltime monitoring capability for the interception of telecommunications. Call associated data should also be provided in real-time. If call associated data cannot be made available in real time, law enforcement agencies require the data to be available as soon as possible upon call termination.

3.Law enforcement agencies require network operators/service providers to provide one or several interfaces from which the intercepted communications can be transmitted to the law enforcement monitoring facility. These interfaces have to be commonly agreed on by the interception authorities and the network operators/service providers. Other issues associated with these interfaces will be handled according to accepted practices in individual countries.

3.1.Law enforcement agencies require network operators/service providers to provide call associated data and call content from the target service in a way that allows for the accurate correlation of call associated data with call content.

3.2.Law enforcement agencies require that the format for transmitting the intercepted communications to the monitoring facility be a generally available format. This format will be agreed upon on an individual country basis.

3.3.If network operators/service providers initiate encoding, compression or encryption of telecommunications traffic, law enforcement agencies require the network operators/service providers to provide intercepted communications en clair.

3.4.Law enforcement agencies require network operators/service providers to be able to transmit the intercepted communications to the law enforcement monitoring facility via fixed or switched connections.

3.5.Law enforcement agencies require that the transmission of the intercepted communications to the monitoring facility meet applicable security requirements.

4.Law enforcement agencies require interceptions to be implemented so that neither the interception target nor any other unauthorized person is aware of any changes made to fulfil the interception order. In particular, the operation of the target service must appear unchanged to the interception subject.

5.Law enforcement agencies require the interception to be designed and implemented to preclude unauthorized or improper use and to safeguard the information related to the interception.

5.1.Law enforcement agencies require network operators/service providers to protect information on which and how many interceptions are being or have been performed, and not disclose information on how interceptions are carried out.

5.2.Law enforcement agencies require network operators/service providers to ensure that intercepted communications are only transmitted to the monitoring agency specified in the interception authorization.

5.3.According to national regulations, network operators/service providers could be obliged to maintain an adequately protected record of activations of interceptions.

6.Based on a lawful inquiry and before implementation of the interception, law enforcement agencies require: (1) the interception subject’s identity, service number or other distinctive identifier; (2) information on the services and features of the telecommunications system used by the interception subject and delivered by network operators/service providers; and (3) information on the technical parameters of the transmission to the law enforcement monitoring facility.

7.During the interception, law enforcement agencies may require information and/or assistance from the network operators/service providers to ensure that the communications acquired at the interception interface are those communications associated with the target service. The type of information and/or assistance required will vary according to the accepted practices in individual countries.

8.Law enforcement agencies require network operators/service providers to make provisions for implementing a number of simultaneous intercepts. Multiple interceptions may be required for a single target service to allow monitoring by more than one law enforcement agency. In this case, network operators/service providers should take precautions to safeguard the identities of the monitoring agencies and ensure the confidentiality of the investigations. The maximum number of simultaneous interceptions for a given subscriber population will be in accordance with national requirements.

9.Law enforcement agencies require network operators/service providers to implement interceptions as quickly as possible (in urgent cases within a few hours or minutes). The response requirements of law enforcement agencies will vary by country and by the type of target service to be intercepted.

10.For the duration of the interception, law enforcement agencies require that the reliability of the services supporting the interception at least equals the reliability of the target services provided to the interception subject. Law enforcement agencies require the quality of service of the intercepted transmissions forwarded to the monitoring facility to comply with the performance standards of the network operators/service providers.

22/7/14 My stats show that this is the most popular post – probably because of the ILETS / ENFOPOL quote above.

Got a spares or repair box off eBay cheap and swaped the processor. It rocks – quad core, 2T hard drive and I only ever use a small part of the memory.

Learning django at the moment and hoping to build a site using it soon. Python is good.

Everything wireless strikes me as fantastically insecure. Normal computer users are going to be vulnerable to evil twins at public hotspots. What about wireless keyboards? That’s a keyboard transmitting what keys are pressed. I don’t know but would doubt that encryption is used.

Continue ReadingAn original geeky post for a change (because as well as a political activist I’m also a geek)

Google and Yahoo furious at reports NSA secretly taps data centres

Spread the love

http://www.theguardian.com/technology/2013/oct/30/google-reports-nsa-secretly-intercepts-data-links

Files obtained from Edward Snowden suggest NSA can collect information sent by fibre optic cable between Google and Yahoo data hubs ‘at will’

google-data-center-street-view
Google and Yahoo, two of the world’s biggest tech companies, reacted angrily to a report on Wednesday that the National Security Agency has secretly intercepted the main communication links that carry their users’ data around the world.

Citing documents obtained from former NSA contractor Edward Snowden and interviews with officials, the Washington Post claimed the agency could collect information “at will” from among hundreds of millions of user accounts.

The documents suggest that the NSA, in partnership with its British counterpart GCHQ, is copying large amounts of data as it flows across fiber-optic cables that carry information between the worldwide data centers of the Silicon Valley giants. The intelligence activities of the NSA outside the US are subject to fewer legal constraints than its domestic actions.

The story is likely to put further strain on the already difficult relations between the tech firms and Washington. The internet giants are furious about the damage done to their reputation in the wake of Snowden’s revelations.

guardian-sourced-NSA-google-interception

According to a top-secret document cited by the Post dated 9 January 2013, millions of records a day are sent from Yahoo and Google internal networks to NSA data warehouses at the agency’s headquarters in Fort Meade, Maryland. The types of information sent ranged from “metadata”, indicating who sent or received emails, the subject line and where and when, to content such as text, audio and video. [edit:  This is discussing data knowingly sent by Google and Yahoo to NSA under the Prism system.]

The Post’s documents state that in the preceding 30 days, field collectors had processed and sent on 181,280,466 new records.

Internet firms go to great lengths to protect their data. But the NSA documents published by the Post appear to boast about their ability to circumvent those protections. In one presentation slide on “Google Cloud Exploitation,” published by the Post, an artist has added a smiley face, in apparent celebration of the NSA’s victory over Google security systems.

The Post said that the interception took place on the cables that connect the internet giants’ data centers. The New York Times reported on Wednesday evening that one of the companies that provides such cables for Google was Level 3. It said in a statement provided to the Times: “We comply with the laws in each country where we operate. In general, governments that seek assistance in law enforcement or security investigations prohibit disclosure of the assistance provided.

The Post said that by collecting the data overseas, the NSA was able to circumvent the legal restrictions that prevent it from accessing the communications of people who live in the United States, and that it fell instead under an executive order, signed by the president, that authorised foreign intelligence operations.

In response, the NSA specifically denied that it used the presidential order to circumvent the restrictions on domestic spying, though the agency said nothing about the rest of the story.

The Independent reports that: The infiltration is striking because the NSA, under a separate programme known as Prism, has front-door access to Google and Yahoo user accounts through a court-approved process.

27/11/13 Having received a takedown notice from the Independent newspaper for a different posting, I have reviewed this article which links to an article at the Independent’s website in order to attempt to ensure conformance with copyright laws.

I consider this posting to comply with copyright laws since
a. Only a small portion of the original article has been quoted satisfying the fair use criteria, and / or
b. This posting satisfies the requirements of a derivative work.

Please be assured that this blog is a non-commercial blog (weblog) which does not feature advertising and has not ever produced any income.

dizzy

Continue ReadingGoogle and Yahoo furious at reports NSA secretly taps data centres

Jack Straw, evil torturing lying cnut

Spread the love

http://www.theguardian.com/world/2012/oct/10/jack-straw-torture-libyan-dissidents

Jack Straw accused of misleading MPs over torture of Libyan dissidents

Former foreign secretary named in legal documents concerning Gaddafi opponents held after MI6 tip-offs

straw_blairJack Straw, the former foreign secretary, and Sir Mark Allen, a former senior MI6 officer, have been cited as key defendants in court documents that describe in detail abuse meted out to Libyan dissidents and their families after being abducted and handed to Muammar Gaddafi‘s secret police with the help of British intelligence.

The documents accuse Straw of misleading MPs about Britain’s role in the rendition of two leading dissidents – Abdel Hakim Belhaj and Sami al-Saadi – and say MI6 must have known they risked being tortured. They say British intelligence officers provided Libyan interrogators with questions to ask their captives and themselves flew to Tripoli to interview the detainees in jail.

They recount how Belhaj was chained, hooded, and beaten; his pregnant wife, Fatima Bouchar, punched and bound; how Saadi was repeatedly assaulted; his wife, Ait Baaziz, hooded and ill-treated; and their children traumatised, as they were abducted and jailed in Libya following tip-offs by MI6 and the CIA in 2004.

Belhaj and Saadi were leading members of the Libyan Islamic Fighting Group, which opposed Gaddafi. Belhaj became head of the Tripoli Brigade during last year’s revolution and is a leading Libyan political figure. They are suing Straw, Allen, MI6, MI5, the Foreign Office, the Home Office, and the attorney general, for damages for unlawful detention, conspiracy to injure, negligence, and abuse of public office. It is believed to be the first time such action has been taken against a former British foreign secretary.

The court documents, served by the law firm Leigh Day and the legal charity and human rights group, Reprieve, allege:

• MI6 alerted Libyan intelligence to the whereabouts of Belhaj and his family. They were held in Malaysia and Thailand and flown to Libya in a CIA plane.

• The CIA and MI6 co-operated in the rendition of Saadi and his family from Hong Kong to Libya via Thailand.

• Straw and his co-defendants knew that torture was endemic in Gaddafi’s Libya.

• British intelligence officers sent detailed questions to the Libyan authorities to be used in Belhaj and Saadi’s interrogations.

• Straw did not tell the truth when he told the Commons foreign affairs committee in 2005 that Britain was not involved in any rendition operations.

• Evidence by Sir John Scarlett, the head of MI6, to the parliamentary intelligence and security committee (ISC) in 2006 that his agency did not assist in any rendition to countries other than the US or the detainee’s country of origin was incorrect and misleading. Bouchar is Moroccan, and Baaziz is Algerian, and neither had been to Libya before their abduction.

• Evidence by an MI5 witness to the Special Immigration Appeals Commission about the renditions was untrue and misleading.

• According to the US flight plan rendering Belhaj and his wife to Libya, the plane would refuel at the American base on the British Indian Ocean territory of Diego Garcia. If it had done so it would contradict assurances made to MPs by the former foreign secretary David Miliband. Referring to the coalition government’s plans for secret courts, Khadidja al-Saadi, who was 12 when she was abducted, said: “I tried writing to Ken Clarke [former justice secretary] about my case – I told him that having a secret court judge my kidnap was the kind of thing Gaddafi would have done.”

http://www.theguardian.com/world/2013/may/22/uk-support-cia-rendition-flights

The Rendition Project suggests aircraft associated with secret detention operations landed at British airports 1,622 times

Evidence gathered by The Rendition Project – an interactive website that maps thousands of rendition flights – highlight 1,622 flights in and out of the UK by aircraft now known to have been involved in the agency’s secret kidnap and detention programme.

While many of those flights may not have been involved in rendition operations, the researchers behind the project have drawn on testimony from detainees, Red Cross reports, courtroom evidence, flight records and invoices to show that at least 144 were entering the UK while suspected of being engaged in rendition operations.

While the CIA used UK airports for refuelling and overnight stopovers, there is no evidence that any landed in the UK with prisoners on board. This may suggest that the UK government denied permission for this. In some cases, it is unclear whether the airline companies would have been aware of the purpose of the flights.

Some 51 different UK airports were used by 84 different aircraft that have been linked by researchers to the rendition programme. Only the US and Canada were visited more frequently. The most used UK airport was Luton, followed by Glasgow Prestwick and Stansted. There were also flights in and out of RAF Northolt and RAF Brize Norton.

The CIA’s use of UK airports was first reported by the Guardian in September 2005. Jack Straw, the then foreign secretary, dismissed the evidence, telling MPs in December that year that “unless we all start to believe in conspiracy theories and that the officials are lying, that I am lying, that behind this there is some kind of secret state which is in league with some dark forces in the United States … there simply is no truth in the claims that the United Kingdom has been involved in rendition.”

Straw told the same MPs that media reports of UK involvement in the mistreatment of detainees were “in the realms of the fantastic”. Documentation subsequently disclosed in the high court in London showed that Straw had consigned British citizens to Guantánamo Bay in Cuba after they were detained in Afghanistan in 2001. …

Ed Miliband pays tribute to “great friend” Jack Straw

miliband“On behalf of the Labour Party, I want to thank him for his nearly 35 years service as an MP, his achievements in government and his eloquence and wisdom.”

He added: “He has been a great friend and loyal supporter to me during my time as leader. It is a measure of the man that I know the same would have been said by the six predecessors of mine under whom he served. He is Labour through and through, and always displayed this in his words and deeds.

“He will be sorely missed but I know he will continue to serve our country in many different ways.”

Continue ReadingJack Straw, evil torturing lying cnut

Leaked memos reveal GCHQ efforts to keep mass surveillance secret

Spread the love

http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden

[Guardian] Exclusive: Edward Snowden papers show UK spy agency fears legal challenge if scale of surveillance is made public

Image of GCHQ donught buildingThe UK intelligence agency GCHQ has repeatedly warned it fears a “damaging public debate” on the scale of its activities because it could lead to legal challenges against its mass-surveillance programmes, classified internal documents reveal.

Memos contained in the cache disclosed by the US whistleblower Edward Snowden detail the agency’s long fight against making intercept evidence admissible as evidence in criminal trials – a policy supported by all three major political parties, but ultimately defeated by the UK’s intelligence community.

Foremost among the reasons was a desire to minimise the potential for challenges against the agency’s large-scale interception programmes, rather than any intrinsic threat to security, the documents show.

The papers also reveal that:

• GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone “well beyond” what they were legally required to do to help intelligence agencies’ mass interception of communications, both in the UK and overseas.

• GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissable in court.

• GCHQ assisted the Home Office in lining up sympathetic people to help with “press handling”, including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and the US National Security Agency.

Continue ReadingLeaked memos reveal GCHQ efforts to keep mass surveillance secret